Abstract
World is now considered as global village because of interconnected networks. Smart phones and large computing devices exchange millions of information each day. Information or data privacy is first priority for any tech company. Information security get attention both from academia and industry sectors for the purpose of data prevention, integrity and data modification. Traditional and mathematical security models are implemented to address information related issues but does not provide full proof data privacy. Computational Intelligence is power technique inspired from biological development and act as intelligent agent which detects treats in real and complex environments. Computational Intelligence is further sub divided in to Fuzzy Logic, Evaluation Computation, Artificial Neural Networks and hybrid approach. In this research study each branch of Computational Intelligence is studied from cybersecurity point of view with its merits and demerits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Dorbala, R. Bhadoria, Analysis for security attacks in cyberphysical systems, in Cyber-Physical Systems: A Computational Perspective (Chapman & Hall, London, U.K., 2015), pp. 395–414
S.K. Khaitan, J.D. McCalley, Design techniques and applications of cyberphysical systems: A survey. IEEE Syst. J. 9(2), 350–365 (2015)
R. Kabir, A.R. Onik, T. Samad, A network intrusion detection framework based on bayesian network using wrapper approach. Int. J. Comput. Appl. 166, 13–17 (2017)
V. Kumar, D. Sinha, A.K. Das, S.C. Pandey, R.T. Goswami, An integrated rule-based intrusion detection system: analysis on UNSW-NB15 data set and the real time online dataset. Clust. Comput. 23(2), 1397–1418 (2020)
X. Larriva-Novo, C. Sánchez-Zas, V.A. Villagrá, M. Vega-Barbas, D. Rivera, An approach for the application of a dynamic multi-class classifier for network intrusion detection systems. Electronics 9(11), 1759 (2020)
H. Alqahtani, I.H. Sarker, A. Kalim, S.M.M. Hossain, S. Ikhlaq, S. Hossain, Cyber intrusion detection using machine learning classification techniques, in International Conference on Computing Science, Communication and Security (Springer, Singapore, 2020), pp. 121–131
D. Gümüşbaş, T. Yıldırım, A. Genovese, F. Scotti, A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems. IEEE Syst. J. (2020)
O. Savas, J. Deng, Big Data Analytics in Cybersecurity (Auerbach, New York, NY, USA, 2017)
A.F. de Retana, A. Miranda-García, Á.M. Guerrero, C. Fernández-Llamas, Attacks detection on sampled netflow traffic through image analysis with convolutional neural networks (CNN), in Computational Intelligence in Security for Information Systems Conference (Springer, Cham, 2021), pp. 33–40
C. Kemp, C. Calvert, T.M. Khoshgoftaar, Detection methods of slow read DoS using full packet capture data, in 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI) (IEEE, 2020), pp. 9–16
M. Fejrskov, J.M. Pedersen, E. Vasilomanolakis, Using NetFlow to measure the impact of deploying DNS-based blacklists, in International Conference on Security and Privacy in Communication Systems (Springer, Cham, 2021), pp. 476–496
R. Iqbal, F. Doctor, B. More, S. Mahmud, U. Yousuf, Big data analytics: computational intelligence techniques and application areas. Technol. Forecast. Soc. Chang. 1–13 (2018). https://doi.org/10.1016/j.techfore.2018.03.024
R.V. Kulkarni, A. Forster, G.K. Venayagamoorthy, Computational intelligence in wireless sensor networks: a survey. IEEE Commun. Surv. Tutor. 13(1), 68–96 (2011)
E.M. El-Alfy, W.S. Awad, Computational intelligence paradigms: an overview, in Proc. Improving Inf. Secur. Pract. Through Comput. Intell. (2016), pp. 1–27
S. Fazli, M. Kiamini, A high performance steganographic method using JPEG and PSO algorithm, in Proc. Int. Conf. IEEE Multitopic (2008), pp. 100–105
F.H. Rabevohitra, J. Sang, High capacity steganographic scheme for JPEG compression using particle swarm optimization. Adv. Mater. Res. 433, 5118–5122 (2012)
C. Chang, C. Lin, Y. Fan, Lossless data hiding for color images based on block truncation coding. Pattern Recognit. 41(7), 2347–2357 (2008)
K. Bhowal, A.J. Pal, G.S. Tomar, P.P. Sarkar, Audio steganography using GA, in Proc. Int. Conf. Comput. Intell. Commun. Netw. (2010), pp. 449–453
M. Khodaei, K. Faez, Image hiding by using genetic algorithm and LSB substitution, in Proc. Int. Conf. Image Signal Process (Berlin, Germany, 2010), pp. 404–411
S. Sonawane, S. Karsoliya, P. Saurabh, B. Verma, Self configuring intrusion detection system, in Proc. 4th Int. Conf. Comput. Intell. Commun. Netw. (2012), pp. 757–761
A. Ahmad, S.B. Maynard, S. Park, Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2), 357–370 (2014)
N. Siddique, H. Adeli, Computational intelligence: synergies of fuzzy logic, in Neural Networks and Evolutionary Computing (Wiley, New York, NY, USA, 2013)
S. Liu, J. Sullivan, J. Ormaner, A practical approach to enterprise IT security. IT Prof. 5, 35–42 (2001)
H. Kumar, Computational intelligence approach for flow shop scheduling problem, in Handbook of Research on Emergent Applications of Optimization Algorithms (IGI Global, Hershey, PA, USA, 2018), pp. 298–313
I. Onat, A. Miri, An intrusion detection system for wireless sensor networks, in Proc. Int. Conf. IEEE Wireless Mobile Comput. Netw. Commun., vol. 3 (2005), pp. 253–259
W. Lee, D. Xiang, Information-theoretic measures for anomaly detection, in Proc. Int. Symp. IEEE Secur. Privacy (2001), pp. 130–143
H. Cavusoglu, B. Mishra, S. Raghunathan, The value of intrusion detection systems in information technology security architecture. Inf. Syst. Res. 16(1), 28–46 (2005)
J. D’Arcy, T. Herath, M.K. Shoss, Understanding employee responses to stressful information security requirements: a coping perspective. J. Manag. Inf. Syst. 31(2), 285–318 (2014)
L. Jobson, A. Stanbury, P.E. Langdon, The self-and other-deception questionnaires-intellectual disabilities (SDQ-ID and ODQ-ID): component analysis and reliability. Res. Dev. Disabil. 34(10), 3576–3582 (2013)
L.A. Zadeh, Fuzzy logic, neural networks, and soft computing, in Fuzzy Sets, Fuzzy Logic, and Fuzzy System (World Scientific, Singapore, 1996), pp. 775–782
D. Gmach, S. Krompass, A. Scholz, M. Wimmer, A. Kemper, Adaptive quality of service management for enterprise services. ACM Trans. Web. 2(1), 8 (2008)
S. Seltzsam, D.L. Gmach, S. Krompass, A. Kemper, Autoglobe: an automatic administration concept for service-oriented database applications, in Proc. 22nd Int. Conf. Data Eng. (2006), p. 90
L.A. Zadeh, Fuzzy logic computing with words. IEEE Trans. Fuzzy Syst. 4(2), 103–111 (1996)
J. Lu, R. Wang, An enhanced fuzzy linear regression model with more flexible spreads. Fuzzy Sets Syst. 160(17), 2505–2523 (2009)
Y. Zeng, M. Zhou, R. Wang, Similarity measure based on nonlinear compensatory model and fuzzy logic inference, in Proc. Int. Conf. IEEE Granular Comput. (2005), pp. 342–345
H. Duman, H. Hagras, V. Callaghan, A multi-society-based intelligent association discovery and selection for ambient intelligence environments. ACM Trans. Auton. Adapt. Syst. 5(2), 7 (2010)
S. Bagchi, A fuzzy algorithm for dynamically adaptive multimedia streaming. ACM Trans. Multimed. Comput. Commun. Appl. 7(2), 11 (2011)
K. Kolomvatsos, C. Anagnostopoulos, S. Hadjiefthymiades, A fuzzy logic system for bargaining in information markets. ACM Trans. Intell. Syst. Technol. 3(2), 32 (2012)
J. Zhan, X. Luo, K.M. Sim, C. Feng, Y. Zhang, A fuzzy logic-based model of a bargaining game, in Proc. Int. Conf. Knowl. Sci., Eng. Manage. (Berlin, Germany, 2013), pp. 387–403
N. Naik, R. Diao, Q. Shen, Dynamic fuzzy rule interpolation and its application to intrusion detection. IEEE Trans. Fuzzy Syst. 26(4), 1878–1892 (2018)
A.K. Choudhary, A. Swarup, Neural network approach for intrusion detection, in Proc. 2nd Int. Conf. Interact. Sci. Inf. Technol. Culture Human (2009), pp. 1297–1301
H. Yakura, S. Shinozaki, R. Nishimura, Y. Oyama, J. Sakuma, Malware analysis of imaged binary samples by convolutional neural network with attention mechanism, in Proc. 8th ACM Conf. Data Appl. Secur. Privacy (2018), pp. 127–134
M. Zheng, S. Zhong, S. Wu, J. Jiang, Steganographer detection based on multiclass dilated residual networks, in Proc. Int. Conf. ACM Multimedia Retrieval (2018), pp. 300–308
J. Yang, C. Eickhoff, Unsupervised learning of parsimonious general-purpose embeddings for user and location modeling. ACM Trans. Inf. Syst. 36(3), 1–33 (2018)
R. Wang, W. Ji, Computational intelligence for information security: a survey. IEEE Trans. Emerg. Top. Comput. Intell. 4(5), 616–629 (2020)
N.N. El-Emam, R.A.S. Al-Zubidy, New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J. Syst. Softw. 86(6), 1465–1481 (2013)
S. Doğan, A new data hiding method based on chaos embedded genetic algorithm for color image. Artif. Intell. Rev. 46(1), 129–143 (2016)
W. Weimer, T.V. Nguyen, C.L. Goues, S. Forrest, Automatically finding patches using genetic programming, in Proc. 31st Int. Conf. Softw. Eng. (2009), pp. 364–374
G. Folino, F.S. Pisani, Combining ensemble of classifiers by using genetic programming for cyber security applications, in Proc. Eur. Conf. Appl. Evol. Comput. (2015), pp. 54–66
G. Folino, F.S. Pisani, P. Sabatino, An incremental ensemble evolved by using genetic programming to efficiently detect drifts in cyber security datasets, in Proc. Int. Conf. Genetic Evol. Comput. (2016), pp. 1103–1110
S. Malhotra, V. Bali, K.K. Paliwal, Genetic programming and K-nearest neighbor classifier-based intrusion detection model, in Proc. 7th Int. Conf. Cloud Comput., Data Sci. Eng. (2017), pp. 42–46
N. Feng, H.J. Wang, M. Li, A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Inf. Sci. 256, 57–73 (2014)
F. Hosseinpour, P.V. Amoli, F. Farahnakian, J. Plosila, T. Hämäläinen, Artificial immune system based intrusion detection: innate immunity using an unsupervised learning approach. Int. J. Digit. Content Technol. Appl. 8(5), 1–12 (2014)
T. Ahmad, S. Ali, S.B.H. Shah et al., Joint mode selection and user association in D2D enabled multitier C-RAN. Clust. Comput (2022). https://doi.org/10.1007/s10586-021-03456-4
S. Ali, M. Sohail, S.B.H. Shah, D. Koundal, M.A. Hassan, A. Abdollahi, I.U. Khan, New trends and advancement in next generation mobile wireless communication (6G): a survey. Wirel. Commun. Mob. Comput. 2021, (2021)
I.U. Khan, M.A. Hassan, M. Fayaz, J. Gwak, M.A. Aziz, Improved sequencing heuristic DSDV protocol using nomadic mobility model for FANETS. Comput. Mater. Contin. 70(2), 3653–3666 (2022)
I.U. Khan, M.A. Hassan, M.D. Alshehri, M.A. Ikram, H.J. Alyamani, R. Alturki, V.T. Hoang, Monitoring system-based flying IoT in public health and sports using ant-enabled energy-aware routing. J. Healthc. Eng. 2021, (2021)
M.A. Hassan, S.I. Ullah, A. Salam, A.W. Ullah, M. Imad, F. Ullah, Energy efficient hierarchical based fish eye state routing protocol for flying ad-hoc networks. Indones. J. Electr. Eng. Comput. Sci. 21(1), 465–471 (2021)
M.A. Hassan, S.I. Ullah, I.U. Khan, S.B. Hussain Shah, A. Salam, A.W. Ullah Khan, Unmanned aerial vehicles routing formation using fisheye state routing for flying ad-hoc networks, in The 4th International Conference on Future Networks and Distributed Systems (ICFNDS) (2020), pp. 1–7
H. Chen, et al., Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research, in Proc. Nat. Conf. Digital Government Res. (2005), pp. 112–113
G. Acampora, M. Gaeta, V. Loia, A.V. Vasilakos, Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Trans. Auton. Adapt. Syst. 5(2), 8 (2010)
K. Xi, J. Hu, B.V.K. Kumar, FE-SViT: a SViT-based fuzzy extractor framework. ACM Trans. Embed. Comput. Syst. 15(4), 78 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hassan, M.A., Ali, S., Imad, M., Bibi, S. (2022). New Advancements in Cybersecurity: A Comprehensive Survey. In: Ouaissa, M., Boulouard, Z., Ouaissa, M., Khan, I.U., Kaosar, M. (eds) Big Data Analytics and Computational Intelligence for Cybersecurity. Studies in Big Data, vol 111. Springer, Cham. https://doi.org/10.1007/978-3-031-05752-6_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-05752-6_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-05751-9
Online ISBN: 978-3-031-05752-6
eBook Packages: Computer ScienceComputer Science (R0)